LazyAdmin

Room Link: https://tryhackme.com/room/lazyadminarrow-up-right

Scanning

Initial Scan

Kali

nmap -A $VICTIM

Scan all ports

No other ports found.

Kali

TCP/80 - HTTP

Kali

Link: https://crackstation.net/arrow-up-right

Tried to ssh with the credentials but it didn't work, went back to searchsploit because I saw a python script before but it needed credentials. I modified the script to take the input because I waa lazy.

Kali

The php reverse shell setups up a reverse shell so I setup a nc listener on Kali and went to the URL the script mentioned.

Kali

Get autocomplete

Victim

Privilege Escalation

The user has access to run backup.pl without a password, I checked the the file and all it does is run a bash script. We have access to write to copy.sh so I changed it to a reverse shell one liner and setup my listener on Kali.

Kali

Victim

Last updated